Home > Research > Publications & Outputs > A survey of key management for secure group com...
View graph of relations

A survey of key management for secure group communications.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

A survey of key management for secure group communications. / Rafaeli, Sandro; Hutchison, David.
In: ACM Computing Surveys, Vol. 35, No. 3, 01.09.2003, p. 309-329.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Rafaeli S, Hutchison D. A survey of key management for secure group communications. ACM Computing Surveys. 2003 Sept 1;35(3):309-329. doi: 10.1145/937503.937506

Author

Rafaeli, Sandro ; Hutchison, David. / A survey of key management for secure group communications. In: ACM Computing Surveys. 2003 ; Vol. 35, No. 3. pp. 309-329.

Bibtex

@article{99c4c70fee1742da8be7ae3a8039ee2c,
title = "A survey of key management for secure group communications.",
abstract = "Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.",
author = "Sandro Rafaeli and David Hutchison",
note = "Computing Surveys is a well-established journal of the ACM. There are four issues published every year, each including three to four articles, and the acceptance rate is very low. This paper summarizes and organizes recent research results in group key management, an active research theme within the important and topical area of network security. It follows research at Lancaster University for the PhD of Sandro Rafaeli, and is one of a sequence of Lancaster PhD topics under the umbrella of Quality of Service (QoS) for computer networks. This paper has been cited in more than 100 articles published worldwide. RAE_import_type : Journal article RAE_uoa_type : Computer Science and Informatics",
year = "2003",
month = sep,
day = "1",
doi = "10.1145/937503.937506",
language = "English",
volume = "35",
pages = "309--329",
journal = "ACM Computing Surveys",
issn = "0360-0300",
publisher = "Association for Computing Machinery (ACM)",
number = "3",

}

RIS

TY - JOUR

T1 - A survey of key management for secure group communications.

AU - Rafaeli, Sandro

AU - Hutchison, David

N1 - Computing Surveys is a well-established journal of the ACM. There are four issues published every year, each including three to four articles, and the acceptance rate is very low. This paper summarizes and organizes recent research results in group key management, an active research theme within the important and topical area of network security. It follows research at Lancaster University for the PhD of Sandro Rafaeli, and is one of a sequence of Lancaster PhD topics under the umbrella of Quality of Service (QoS) for computer networks. This paper has been cited in more than 100 articles published worldwide. RAE_import_type : Journal article RAE_uoa_type : Computer Science and Informatics

PY - 2003/9/1

Y1 - 2003/9/1

N2 - Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.

AB - Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.

U2 - 10.1145/937503.937506

DO - 10.1145/937503.937506

M3 - Journal article

VL - 35

SP - 309

EP - 329

JO - ACM Computing Surveys

JF - ACM Computing Surveys

SN - 0360-0300

IS - 3

ER -